Imagen de perfil de zeeshankhalid18
Bandera de Pakistan Rawalpindi, Pakistan
Miembro desde 12 de agosto de 2017
0 Recomendaciones


En línea Desconectado
If you are the person who likes to have full control in professional life with the peace of mind,guaranteed satisfaction and trustworthy business relationship, then I can help you to fulfill your dreams. I'm a self-motivated, reliable Systems and Security Administrator with strong work ethics. I have experience in managing, securing and analyzing hundreds of XEN servers including Web servers,DHCP,DNS,VPN,RADIUS,CRM,IPA,CISCO UCS blade servers, EMC Storage infrastructure,EMC VPLEX, EMC VNX,EMC brocade switches,couple of data centers and Cisco Firepower NGFW(FTD) as well in ISP. I am sure I can contribute to the growth and profit for your organization, project or business and I would appreciate the opportunity to show you how can I help to meet your goals.
$5 USD/hr
3 comentarios
  • 100%Trabajos finalizados
  • 100%Dentro del Presupuesto
  • 100%A tiempo
  • N/ATasa de recontratación


Comentarios recientes


Systems Engineer

Sep 2015

• Deployment, Management and Planing of Data centers ,Cisco UCS Blade, Xen HA cluster and Virtualization, EMC SAN,RADIUS, IPA,WHM, Email servers, DNS, DHCP, VPN and VPS etc. • Cisco Firepower NGFW(FTD) • Hands on experience on Linux and Windows Servers etc. • Securing applications and Infrastructure using IPS, Next generation firewall, ADDS and CSX. • Coordination with Internal Departments and vendors regarding services design and optimization • Improving and designing new SOPs


Bsc Computer Engineering

2011 - 2015 (4 years)


PCONA (2016)

Plumgrid University

Introduction to cloud computing, cloud services, OpenStack and ONS and comparison between traditional Datacenters and New Datacenters.

PCONP (2016)

Plumgrid University

Deployment and configuration of cloud computing and cloud services in datacenters.

Systems and Network Security (2017)


Introduction to Network and systems security, attacks and vulnerabilities, cryptography, public private key infrastructure,TLS/SSL,IPSec,Botnets,DDOS,DNSSec,Email security and Firewall

Web Application Security (2016)

Trillium Information Security Systems (TISS)

The Practical knowledge related to following topics: Information Gathering Configuration and Development management Testing Identity Management Testing Authentication Testing Authorization Testing Session Management Testing Input Validation Testing Error Handling Cryptography Client Side Testing Web Services Ajax Testig Testing with Vulnerability Scanning Dvwa + ModSec Secure Software Development Cycle

Mobile Application Security (2016)

Trillium Information Security Systems (TISS)

Weak Server Side Control Insecure Data Storage Insufficient Transport Layer Protection Unintended Data Leakage Poor Authentication and Authorization Broken Cryptgraphy Client Side Injection Security Decision Via Untrusted Inputs Improper Session Handling Lack of Binary Protection

EMC VPLEX Managment Trainig (SAN) (2016)


Deployment,Design and Planning of storage in the different datacenters using EMC VPLEX manager.

Red Hat Training (2017)


• Configuration, Optimization and tuning of OS and Apache servers for Dynamic Applications • NFS, automounting, Filesystems tuning • Network Tuning and OS tuning • SeLinux Deployment for securing application level security • Configuration of DHCP and DNS servers • SAN, NAS and DAS

Basic Engineering Traning (2015)


Details of TCP/IP and OSI model Transmition Protocols for Video Streaming Introduction to FTTH and NGN Introduction to routing protocols

CISCO CCNA Cyber OPS Security (2017)


- Understanding Cisco Cybersecurity Fundamentals (SECFND) - Implementing Cisco Cybersecurity Operations (SECOPS)

Certified Penetration Testing And Ethical Hacking (2018)

Tranchulas | Cyber Security Company

Penetration Testing Planning and Scoping Basic Usage of Linux and its services Information Gathering Port Scanning Sniffing & Man In The Middle Attacks Vulnerability Assessment Buffer Overflow Exploitation Exploitation Client Side Exploitation Post Exploitation Password Attacks Messing with Ports Web Application Hacking Wireless Hacking


  • Conectado a Facebook
  • Freelancer Preferido
  • Pago verificado
  • Teléfono verificado
  • Identidad verificada
  • Correo Electrónico Verificado

Mis habilidades principales

Buscar freelancers similares